Subscribe to our Threatpost Today newsletter

Join thousands of people who receive the latest breaking cybersecurity news every day.

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

*

*

I agree to my personal data being stored and used to receive the newsletter

*

I agree to accept information and occasional commercial offers from Threatpost partners

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

Air Force Hopes To Attract Hackers With Bug Bounty Program

The Hack the Air Force bug bounty program invites white hats from inside and outside the U.S. to hack its websites.

On Wednesday, the United States Air Force became the latest division of the U.S. Armed Forces to announce a public-facing bug bounty program. The program, Hack the Air Force, invites vetted white hat security experts to hack key public-facing Air Force websites.

The Air Force follows in the footsteps of Hack the Army, announced in November, and the U.S. government’s first public-facing bug bounty program Hack the Pentagon, launched in March 2016.

“We are excited to partner with and mobilize the best talent from across the nation and our partners and give them opportunities to serve and strengthen our national defense,” said Lisa Disbrow, acting secretary of the Air Force in a prepared statement.

The initiative will be an invite-only program managed by HackerOne, which also ran Hack the Pentagon and Hack the Army. The Air Force’s bounty program will select from applicants from the U.S. and for the first time security experts from outside the U.S. from countries such as the United Kingdom, Canada, Australia and New Zealand.

Cash rewards for the program were not announced. However, the Hack the Pentagon bug bounty program included more than 1,400 registered hackers and paid out $75,000 in total bounties to an undisclosed number of participating hackers, according to the Air Force.

The Hack the Air Force initiative is part of a Cyber Secure campaign sponsored by the Air Force. Interested participants must register through the program’s official HackerOne webpage starting on May 15. The contest runs from May 30 to June 23. According to the Air Force, monetary rewards and the specific scope of the Hack the Air Force program won’t be announced until the challenge starts on May 30.

“This is the first time the AF has opened up our networks to such a broad scrutiny,” said Peter Kim, chief information security officer with the Air Force. “We have malicious hackers trying to get into our systems every day. It will be nice to have friendly hackers taking a shot and, most importantly, showing us how to improve our cybersecurity and defense posture.”

Kim said past public bug bounty programs run by the U.S. government were crucial when it came to competing with companies such as Facebook and Google for talent.

Kim made the announcement at a launch event at HackerOne’s San Francisco headquarters on Wednesday.

Authors

Threatpost

InfoSec Insider Post

InfoSec Insider content is written by a trusted community of Threatpost cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective and non-commercial.

Sponsored

Sponsored Post

Sponsored Content is paid for by an advertiser. Sponsored content is written and edited by members of our sponsor community. This content creates an opportunity for a sponsor to provide insight and commentary from their point-of-view directly to the Threatpost audience. The Threatpost editorial team does not participate in the writing or editing of Sponsored Content.